General
-
Target
6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370
-
Size
17.5MB
-
Sample
231223-xdxajsfec7
-
MD5
087f6135bb6879ae18b40f72cdb66de8
-
SHA1
79943d56d978fce7f26800c74117e7725160322d
-
SHA256
6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370
-
SHA512
d73ec3a3054fca6e90a49b3a58756975eb973856e80b3d0d57e1ada5bbce7c3e46e3f9aca98b497d84339ddfefb07ca37da296a40d0f74555d3ffa495c3bf60a
-
SSDEEP
393216:cCZp4RzJXMfn+T5vsXy4k7HvfBoN2Nmk0FQyPqc66J9:FkR1XQWhKy4k7yNAhi66J9
Static task
static1
Behavioral task
behavioral1
Sample
6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370
-
Size
17.5MB
-
MD5
087f6135bb6879ae18b40f72cdb66de8
-
SHA1
79943d56d978fce7f26800c74117e7725160322d
-
SHA256
6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370
-
SHA512
d73ec3a3054fca6e90a49b3a58756975eb973856e80b3d0d57e1ada5bbce7c3e46e3f9aca98b497d84339ddfefb07ca37da296a40d0f74555d3ffa495c3bf60a
-
SSDEEP
393216:cCZp4RzJXMfn+T5vsXy4k7HvfBoN2Nmk0FQyPqc66J9:FkR1XQWhKy4k7yNAhi66J9
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-